While performing a mobile application penetration test, a security consultant notices that the user password is being locally encrypted before it is sent to the back end for authentication. Which of the following techniques would be best for the consultant to use to find the encryption algorithm and the encryption key?
Nikamy
5 months, 3 weeks ago